💾 Archived View for spam.works › mirrors › textfiles › phreak › mip1.phk captured on 2023-06-16 at 19:46:01.
-=-=-=-=-=-=-
Welcome to the Mishandled Information Publication! This is a magazine put out for informational purposes to the masses. It is created for the people that enjoy to learn new things, and this first issue is a biggie. The magazine itself would not be in existance if it were not for the help of these people: Bellcon Surge Ansi-Christ and DITTO All the files in this magazine were donated by people who decided it was time that thier knowledge be shown so that others could learn. Expect to see some regular features in this magazine, and some big changes, so sit back, relax, and start your journey into the land of knowledge, welcome to the first issue of the Mishandled Information Publication! The Fascist Plate Please note that all files are not spell checked, so the appearance of some of these files just depended on the "intelligence" of the writers. I think I'll be buying some dictionaries for Christmas this year........BC TABLE OF CONTENTS 1. Local Area Networks...................Ansi-Christ 2. On Payphones................................Surge 3. On Pedestals......................Bellcon & Surge 4. Hotel Fun.................................Bellcon 5. MERIT Systems...............................Surge 6. Ring-Busy Device............................Ditto 7. Crashing C-NET's II.........................Ditto 8. Caldor Numbers......................Fascist Plate 9. Neat Numbers........................Fascist Plate 10. Parody Song...................Bellcon & The Surge Local Area Networks (LAN) by Ansi-Christ [This is the only file formatted for even printing.] A local area network connects devices that are within a short range. Most LANs are unable to connect to public communications services. LANs were developed because most communications within a business either occur in the very same building or within a short distance of each other. This allows for the sharing of information and equipment and thus a large savings for the company. This files is the first in a series of files. It is not meant to be a complete systems manual for all LANs, but a basic reference manual on the terminology and general set up. In later files there will be more specific information. This file can be distributed freely as long as none of the information is changed. If I have made a mistake, please remember that we are all human and this does happen. Contact me on one of the two boards listed at the end to point out an error. Topologies: Ring - A ring type set up goes in one direction around a group of devices until it reaches the device that is meant as the destination. The ring will be connected by a cable to form the ring. The ring topology uses a method known as token passing. A token is like a bucket in which information can be dumped. If a certain device does not contain this "bucket" then it can not send out the data until it gets it. This will prevent data collision from occurring. A LAN will usually transmit data in packets (buckets = packets) and add the necessary routing information to the packet. (this tells the packet where it's destination is) Because a ring system has a circular shape the information is routed in one direction and it will still reach its destination. One note - I have altered the description of a token slightly to avoid confusion. A token is usually sent before a packet and will tell the next device if the following packet is full or is capable of receiving data. Diagram of a ring topology: O---------O / \ O = nodes | | O O (I apologize for the shitty diagram) \ | \ | O-----O----O Tree - The tree set up links components to the network via connectors. The network can be tapped at any available point. Data can pass from one device to another and does not have to route through a centralized point. Just the way a tree network is set up should make it much faster than a ring type network with the same computers and devices connected to it. This type of network is also very useful because you could add any additional devices as they were need via a connector without having to go through major modifications to the network itself. A tree network does occasionally, just because of the nature of it's set up, have certain problems with controlling the passing of data. There is a safety factor involved with a tree network though. If one of the systems along the network go down it will not adversely affect the network as a whole, just that certain part. Diagram of a tree network: again I apologize for the shitty diagram. O / \ O \ | O | O | | | O O | / | / O Star - The star network is connected through a central processing device. This device usually takes the form of a PBX or a host computer system. All lines in this network are connected to this central unit. When information must go to another node on this network it must first pass through the center. The star topology is very common and is probably the most common set up for a network. There is a problem with the star though. If the central unit goes down then the whole network is useless. Diagram of a star topology: O O | O \ | / \ | / \ | / O--------O--------O / |\ / | \ / | \ O | O O Transmission media - Twisted pair wire is commonly used to connect all kinds of equipment. This is used in older buildings where it may be very expensive to convert to newer types of cable. Problems with this include distortion of signals especially at higher transmission speeds. Coaxial cable consists of a single conductor surrounded by a flexible metallic shielding to minimize signal loss and interference. Coaxial permits a high transmission speed. Twin - Axial cable uses two Coaxial cables, one receiving and one transmitting. These cables are better than twisted pair cable because of the higher transmission speed and longer distance. Baseband and Broadband Systems - A baseband LAN assigns its entire capacity to a single user for a brief time. Only one device can use its pathway. These networks usually use 3/8 inch coaxial cable. Advantages are low cost, easy installation, and considerable capacity. Baseband does, though, not lend itself to voice quality communication. A broadband LAN is sophisticated and uses common television cable and a modem. Although it is expensive it will allow the network to handle voice, video, teleconferencing, and graphics transmission. It does this by using different bandwidths so one signal does not interfere with another signal. It is good for high volume office communication. Fiber Optics are the next step although very expensive it will eventually replace the other cables. Fiber Optics use light to transmit large amounts of information in a very short time. A single cable can carry 240 thousand calls at once. Interconnecting LANs - Bridges are one way of connecting similar networks. Gateways are a way of connecting dissimilar networks. It acts as a translator between these networks. It understands different file structures, data types, and access methods. Vendors - Ungermann-Bass is a large independent vendor. Offering both base and broadband services and coaxial cable and fiber optic LANs. Systek is the OEM supplier of IBM's broadband network. 3Com is a major supplier of PC LANs. Corvus sells Omninet. They offer a system based on twisted pair wiring. Interlan Inc. provides Ethernet based products. Wangnet by Wang laboratories. Codex 4000 series by Codex corp. Information systems network by none other than AT&T information systems. (commonly abbreviated ISN) Novell network LAN terms and what they mean - (note - originally printed in LAN magazine) Access method: a way to determine which workstation or PC will be next to use the LAN. A set of rules by network hardware and software that direct the traffic over the network. Examples include Token passing and Carrier Sense Multiple Access for Collision Detection (CSMA/CD) Collision: The result of two workstations trying to use a shared transmission medium (cable) at the same time. The electronic signals collide and ruin both signals. The whole process takes seconds. Collision detection: The process of detecting when a collision has occurred. Workstations know a collision has occurred if the other station sends no reply that the signal was received. Disk Server: a device equipped with disks and a program that allows users to make and store files on the disks. Allows each user to have an increase in storage space normally not accessible at their PC. Drop cable: The cable which allows connection and access to the trunk cables of a network. Locking: prevents people from changing the same data at the same time. Polling: used in star networks. allows the central "hub" system to know when a node wants to transmit. LAN Magazine Call Anarchia at 518-869-6035 12 West 21 Street TSD at 518-377-6487 New York, NY 10010 1-800-LIBRARY or boards for those who take their 212-691-8251 telecom seriously. Look for part II soon - Novell Network commands and syntax ------------------------------------------------------------------------------- On Payphones - By The Surge A payphone is a payphone is a payphone, I think that Shakespeare said that once. At anyrate, the payphone I will be dealing mostly with, due to my familiarity with this model, is the Western Electric Rotary fone.This should hold true to most models of payphones as I will not go into vivid detail on the aspects of this model alone. This is basically my notes on the findings that I have come up with upon opening payphones that I deem noteworthy to myself and others who have not opened payphones or have not studied payphones that they have opened in depth. Opening the phone. One of the most important concepts to realize when opening a payphone is that a payphone is basically a wall-mounted safe containing a phone (with dtmf pad/rotary dial exposed) and a cashbox (and related mechanisms). When opening a safe, you must realize that the easiest way to open a safe is through the opening method provided. In the case of the payphone, this consists of a lock and a turn-key insert. This lock is in the middle of the right hand side of the phone. This contains many tumblers similar to a safe and can be manipulated by drilling a hole around the key insert with a hole-saw drill. The turn-key is on the left side at the same level as the cradle for the hand- set. Drill a similar hole around this mechanism also. In removing the tumblers of the right side, you will expose the slide that should be pressed downward by a screwdriver or similar probing type tool. Then the same should be done to the turn-key side. Use of a mallet may assist the pushing of the probe to get the slide into the down position. At this time the top-front of the phone should be lifted upward and outward and the insides will be exposed. The black metal is only a shell that covers the inner metal and removal of this metal will accomplish nothing. Payphones were meant to withstand the attact of a vandal who does not have power tools. No matter what gamma rays may turn you into the Incredible Hulk, you will not be able to open the phone without power tools. To elaborate on how strong the metal is, in opening a dented phone, I broke 1 hole-saw drill bit, 2 screwdrivers and a mallet. All physical manhandling will do to a phone is to bind the lock and wreck the electrical devices inside. Once the lock is bound, it is next to impossible to open the phone without a blow-torch. Also, if you know a locksmith well enough and the lock is still in working condition you may be able to have a key made up for it (with the right connections, this is not impossible as I have found out). Tone Oscilator- AKA the redbox holds, on the Western Electric models at least, a 2 way switch which you may find interesting. It is labled CF DTF for Coin First and Dial-tone First as you may have read in BIOC 003's course VI on payphones. It is very interesting and annoying to realize that it is a switch you will find every time that you walk up to a phone that is set to CF. "Jeeze, all I have to do is throw one stupid leetle (Mexican for little) switch and I could use a Blue Box, code, 3rd party billing, collect-call, 800-diverter ect.... The tone oscilator is connected to a central unit via 11 pin connector. Dialing Unit- The dialing unit is also connected into the central unit via an 11 pin connector. The dialing unit holds the dtmf pad/rotary dialing wheel and the cradle and the cord to the hand-set. The cord to the hand-set is protected with an armoured outside shell and a very strong cable inside which the red, yellow, black and green wires braid themselves around. Coin Mechanism- The coin mechanism starts in the upper left hand side of the phone and goes back to the back of the phone, through the totalizer (red-box mechanism) and and back out to the bottom-front of the phone. It will hold a maximum of 17 quarters before the load has to be dropped into the cashbox (that is why you should never try to red-box more than $4.25 into a phone at any one interval.) At that point as one noted friend of mine found out (Dr. Killdeath) something like this will happen: "Hello?" "Hello sir, this is the operator. Just what exactly are you trying to pull here?" "Your leg baby!" -click! Conclusion- Maybe I will find out even more with my next payphone and as allways, I will be willing to share my findings with all that are willing to take interest and read. Dr. Killdeath, if you read this, contact me at one of the boards I have mentioned bellow as I haven't heard from you since Red Square. Any comments (especially additions) please contact me at any of the boards I call. ------------------------------------------------------------------------------- On pedestals - By The Surge & Bellcon First off, by far, phreaking entails much much more than codes. The true phreak is into the "hands-on" aspect of phreaking more than the bluebox programs or the codes. This experience is using actual blueboxes, trashing and the now ever so popular and still growing field of 'pedestal hacking.' Pedestals are the 'cans', or grey-green boxes that are owned by Bell on the side of the road. These appear only in rural or suburban areas. In cities, you must use the same methods but these ports may be found in manholes instead. Basically, a pedestal is an interface, are bridging gap, between two stretches of telephone cables. The first stretch being from your Central Office to your street, and the second from there to your house. In every-day use, it is mainly used as an access port for line testing and installation by lineman. They are no longer needed in the use of manual eavesdropping by Bell since all modern eavesdropping is done in your Central Office, and will be undetected because there is no voltage drop. This is not to say that you cannot eavesdrop from these points though. Radio Schlock sells a $20.00 recorder that will only record when there is a drop in voltage on the line (someone picks up a phone) which can be attached at the terminal set of the person you wish to eavesdrop on. Other than this device, Radio Schlock also sells the new CPA-1000 pen register. This will keep acurate tabs on any phoneline you wish to keep these records on and runs about $100.00. (See May '87 of 2600 Magazine.) Keep in mind that to hook these devices up to someones phone lines is not only an invasion of privacy but is also in many ways against the law. If you are in the pedestal to begin with you obviously have no regard for either so I guess it is no big deal. Of course you all have the files on how to build "beige" boxes aka linesman's handsets so I won't bother with that. This is of course an effective tool to monitor conversations. I personally use an actual test set which has the built in monitor on it so it goes virtually un-noticed. If you wish to modify your own phone to do the same, just disconnect the grey (or blue or white) wire on the F1-Post and the same effect will be accomplished in a cruder way. The big drawback is that you will wind up bringing the entire base of the phone along with you to have this feature. Next order of business is some annoying things that you can do to someone from the pedestal. Basically, when you are at the pedestal you have much more power than at any of their phones. If they detect you on the line and go to call the "proper" authorities, just disconnect the wires from the terminal blocks and they can not complete the call because their phone will be dead. Then run like hell. Elsewhere in this issue of MIP are the plans for the 'ring-busy' device. This may also be hooked to the terminal blocks easily. I do recommend printing out that file or at least saving it to disk as it could come in very handy. It makes the line ring once, then give busy status. The owner of the line can make outgoing calls but will not even hear the first ring. One thing to remember when using the monitor/disconnect or the ring-busy device is that if the owner of the line has 2 lines, be sure to disconnect/busy both of them. Experimentation is something that is the best about pedestal hacking. It is pretty much wide open. [No pun intended.] One interesting thing that you can do is to run wires from one set of terminal blocks to the other. Both lines will be connected to each other and this provides quite a humourous effect to listen in on a test set with. Another good way of phucking around is to take the wires running from one set of terminal blocks and change them with wires from another set of terminal blocks. This will cause all line A's calls to go to house B and vice-versa. Another interesting device to hook up (neither of us have tried this but in theory it could work) is to take a battery that will produce a large (but not too large) amount of voltage (like a car battery) and hook this up to an alternater which will cause the voltage to run in pulses. This will cause the line to constantly ring [or at least make the bell ringer lock up] until the phone is picked up. When the phone is put back down, this will continue. This will disallow outgoing and incoming calls and be a general annoyance. Opening the pedestal can be acheived simply. If it is the type of a case that has 2 doors on the front and opens like a closet (quiet front or QF) just insert a 7/16" socket wrench (key word-socket since there are washers around the nut that make it impossible to use anything but a socket wrench or nut-driver) and just follow the directions printed above the handle. For the 'can' type boxes, just undo the nuts with a 7/16" socket wrench (again, only socket) and lift the front cover off by pulling on the 'handle' at the bottom and pulling down and off. (This also makes a great seat on those wet nights!). Now all you have to do is find out what line you are accessing (be sure it's not yours!) by using ANI. If you are not from the 518 area I would suggest subscribing to 2600 and writing in for your ANI (if you don't allready know it) If you are from 518, 998 (or in some weird places 997) is what you want to dial to find the number of the line that you are on. Once you are sure that it is not yours, you can call anywhere for free since you are using the phone of someone else. One thing that I have noticed in looking around at a lot of pedestals is what we call a 'node'. It is protected by a black rubber cap. The nodes are easy to see, as they are usally two or three feet up the pole, and have black wires running either from the ground, or the top of the pole. The caps can be very easily removed to expose a set of terminal posts. Since these nodes are mounted on the telephone pole they provide easy access to the lines since you don't have to open a pedestal at all to get at them. They are, other than the access-ability factor, the same as the terminal blocks inside of a pedestal. One thing that should be mentioned is a reminder. If you happen to cut any of the wires inside, intentionally or not, you have committed a serious crime. Not only is this theft and vandalism, it may be deemed by officials as something more organized. Many things are carried over phone lines besides just voices. Lines such as bank or lottery data, medical systems, and alarm systems are a few of the things that when cut, could lead to some serious trouble. In one such case similar to this, the local division of the FBI showed up for some thorough investigating (along with TelCo and State Police.) Well, that is just about all that I have to say 'on pedestals'. One final note, a pedestal is not yet in use, there is still current running through it although you will not get a dialtone from any of the terminals or wires themselves. They are basically useless although the cases make great end tables for your room. Look in the future for a follow up file dealing with test probes and other lineman paraphenalia as well as with anything else that we learn from Ma Bell (knock on wood). TTFN! The Surge (T$) Bellcon +-----------------------------------------------------------------------------+ ! Getting The Most For Your Money -- Hotels ! ! Written for M.I. Magazine -- 5-4-87 ! +-----------------------------------------------------------------------------+ Have you ever been on vacation and while staying in a hotel you realized that they are ripping you off? If so, read on. I will list some various ways to save money and possibly have a good time screwing them over. While staying in a hotel room you may realize that it is not very easy to phreak from the room due to the fact that they monitor every outgoing call. If there is no charge for outgoing calls, feel 'free' to phreak as you normally would from home. If there is a charge, you may be able to phreak using alternative methods. On your hotel phone it may say 'dial 8+1+(area code) + number.' This is of course is just designating that you want an outside line, and to record billing for hotel records purposes. Try dialing other numbers first other than an 8 first. If you get a dial tone then use that line to dial out. You may still get billed for it, but then again, you may not. It sure as hell can't hurt. For some reason hotels are now all going to modular jacks...this is a direct invitation to take what (what could be easier?) When most maids are done cleaning they will leave the doors to rooms open. Walk right in and take a phone from that room. I would not advise that you take your own phone (for obvious reasons.) There is of course the tried and true method of walking over to a hotel pay phone to carry out your business. This also brings up an interesting point. Most hotel phones are indoors on hotel walls. The strongest support they have to the wall is some plaster and a few wood screws. It would be a bit risky to take one from this location, but it's always an option. Upon looking around many hotels, you may notice that the power switches for ENTIRE hallways are left in the open, unlocked. This could bring about a quite chaotic situation, making it quite easy for you to enter someone's room and take what you please. Be weary of the emergency power lights that are ALWAYS in hotels. I would not suggest you do this, it is only proving that hotel management is not always the smartest class of people in the world. If the hotel is of any good quality, it will have a restaurant somewhere on the premisis. Walk in and eat until you burst, upon paying your bill politely ask if you can bill it to your hotel room. Be sure to ask if these arrangements can be made before-hand. All they will want is a name and room number. Make any room and name up as they will not usually verify it. (What hotel would want to harrass and 'honest' customer?) Finally, when checking in and out, keep your eyes on the computer. As stated earlier, hotel management is not too smart. Not smart enough to remember logon procedures and passwords that is. It is not unlikely that the whole procedure will be written stamped on the terminal. Keep this for future reference! If you are not impressed with this file, stop complaining. Request something next issue, or take whatever you get. You're not PAYING for this! (A Mishandled Magazine Production!) ================================?============================== Merit destinations--- Autonet CMU-Cyber Datapac Dial1200-AA Dial300-AA Internet ITI MAGNET MSUnet-CLSI MSUnet-EGRNET MSUnet-IBM MSUnet MTU MTUS5 OU-SECS RPI RUAC SDSC Telenet UM-CAVAX UM-CLINFO UM-CVVAX UM-DSC UM-EnginHarris UM-MMVAX UM-QuickSlides UM-RAVAX umix UMLIB UMLIB-300 WMU-CAE WMU-Kanga WMU-Pooh WMU-Puff WMU-Tigger WSU-CSVAX WSU-ET ZOOnet-KCollege Zoonet-KVCC Here are some additional destinations that are accessable via merit..... ABA/NET ACP ADPNS-261 ADPNS-3 ADPNS-446 ADPNS-9 Alberta ARTFL Automail-23 Automail-297 Boeing British-Columbia BRS Cal-Berkeley Calgary Caltech-HEP Carnegie-DEC-20 Carnegie-MICOM Carnegie-11/45 CompuServe Comshare Cornell Dalhousie DatapacInfo Dialcom Dialog-Index Dialog-V1 Dialog-V2 Dow-Jones Guelph Illinois Illinois-Cyber LEXIS Manitoba Maryland-Unix McGill MGH Minnesota-Cyber Minnesota-VAX MIT-Multics MIT-VM Montreal Natl-Lib-Med NCAR-Telenet New-Brunswick Newsnet NJIT-EIES NLM NLM-MCS Notre-Dame NRC NYTimes OAG Queens Rice RLIN SDC SFU Simon-Fraser Source Source-11 Source-12 Source-13 Stanford STN Sumex Telenet-Cust-Serv Telenet-Mail Telenet-Telemail Toronto TUCC UBC UBC-CS UBC-EAN UBC-VISION UQV Press RETURN to continue Victoria VMShare Vutext-Can Vutext-Freep Vutext-other Washington Waterloo-TSS Waterloo-VM WestLaw Wilsonline Wisconsin-MACC Wisconsin-VAX Yale This is the best list that I could get a hold of. Hacking Merit is very interesting as you can reach telenet via merit as well as all these adresses that are listed above. If you know telenet, you know that this makes Merit practically unlimited. I hear from Bellcon that there is a UNIX out there with the uucp account and password uucp but it needs a core dump to get to the prompt. If you are into that sort of thing, go for it! If not, there are still quite a few other destinations that you may wish to hack. I am sure that that UNIX is wide open seeing that uucp's pw was uucp. Try the other default accounts. Merit is down at this time due to extensive hacking and a friend of mine got a little note on his MTS account about this so be carefull not to do this from MTS or anywhere where it can be tied to you. To get to MERIT just type: %call 999900009999 when you are connected to the 266-8989 dialup or any dialup of ISNET. I hear that the 266 prefix will be soon changed to 276 but the last 4 digits of ISNET will remain the same 8989. I hope you enjoyed this file. It took no great intelligence to write but can be used as a reference for serious hackers who have not tried MERIT yet. This is a way for you to get started and I wish you the best of luck on getting accounts in all your travels and hope you never choose to destroy any data or system anywhere. Remember, the greatest sence of power comes from holding the power to destroy a system, and choosing not to.. T$ =============================================================================== ....................................... . The HOW TO File . . On Making . . The Ring-Busy Device . . Designed And Written By . . ]>itto AKA Shlomo . ....................................... Introduction ------------ Well this is the How To file on The Ring-Busy Device. This is very simple to construct and is also very simple to connect on someones fone line. It is probably the easiest thing you will ever do what is actually worth what little effort you put in. Now your probably saying to yourslef: What The Hell Is A Ring-Busy Device? ------------------------------------ A Ring-Busy Device is of course a device that when connected on to you enemys fone line will make it so that when you call this persons fone you will get a Ring-Busy. A ring-busy is exactly what it says, A ring and then a busy, That is One ring and from then on busy. Also the pathetic person who has the fone that this device is being used on will not have his fone ring. This means he will not even know that anyone is calling. Your probably saying BIG DEAL, why not just cut his line! Well this is better because he can still use his fone, thats right, if he wanted to he could pick up his fone and he would get a dial tone, he could then dial out not knowing of this device. This is especially useful for those r0dent BBS's that are pissing you off. If someone has a BBS and this device is on the line then they wont get any calls for their BBS (hehe), and they wont know why either! How the Ring-Busy Device Was Conceived -------------------------------------- It all started one morning at 4am when I went out special to steal this emergency police/fire fone. Once I got it home I hooked it up to my line and noticed that whenever someone called me they would get a ring-busy, this was extremely odd, so I tried to figure out why the hell that was happening, and I did, and now we have the Ring-Busy device. It is also useful if dont want to talk to someone but you dont want to put the fone off the hook, just put this little device on and those leeches that keep bothering you for games wont be a problem anymore. Ring-Busy Device Plans ---------------------- As I said before this is very very simple to construct. Parts Needed: (1) 7k resistor (7000 OHMS) (1) Fone line (1/2) a brain (at least) Procedure: Now all you have to do is connect up this 7k resistor to the fone line on the red and green terminals, Here is an easy diagram of how to add it onto someones fone line. The diagram represents the nice little box that the fone line comes through on the side of your house. NOTE: This is for a 1 fone line configuration. If they have two I think you'd figure it out? If not too Bad... Diagram: ######### # # # G-7-R # # # ######### G - Green terminal R - Red Terminal 7 - 7k resistor Now if they have 2 fone lines then connect another 7k resistor to the black and yellow terminals. Its That Simple.... 7k resistors might be a some-what hard to get, try your local electronics store and dont bother with Rat Shack, I already checked, they dont sell them. If you must, a 6.5k or maybe 7.5k resistor will work, but Ma Bell uses 7k so I do the same. Suggestions ----------- Here are a few ways to use or misuse this device. 1) Connect it on to your fone: Simple just cut off the modular end of your fone cord and connect it to the red and green wires, then connect the modular plug you cut off to the resistor too, and then just plug the fone in and you have a permanent Ring-Busy Device, Another way of doing it would be to put a SPST switch in there so you can turn it on or off, thats what I do and it works great (Especially when r0dents start bothering me) 2) Connect it to your favorite enemys fone line, and enjoy while watching him try to figure out why he isn't getting any fone calls, BUT if the luser has 2 fone lines I suggest that you connect one Ring-Busy Device onto each fone so he doesn't get calls on the other fone from people telling him that his fone is phucked. Conclusion ---------- Well as this file comes to an end, I would like to tell you to call some of the best boards around: Disclaimer ---------- This file is for informational purposes only, it is not meant for small children or the mentally unbalanced. In no way is the author liable for use or misuse of this device. Also note that the author can not and will not take any responsiblity for any actions as a result of this file. ============================================================================== ....................................... . The HOW TO File . . On Crashing A C-Net . . Part Two . . By ]>itto . . AKA Shlomo . ....................................... Introduction: ------------- In this file on Crahing a C-Net I will discuss methods of making, using, and getting backdoors on C-Net, I will also show some C-Net programming and how to make your very own backdoor! First I will discuss ways to get SysOp access on a cnet...There are a few ways and most are effective. Method 1 -------- Now this method is quite simple BUT a certain access level is needed. This works like this: First: you must try and convince the SysOp to give you SubOp access of one of the UD sections, this is the only thing stopping you from complete control of his board. If you dont have a commie then try to convince him to have maybe a g-philes section or a UD section of your computer type and for him to make you a subop, this won't be too hard if you are an expert in the art of bullshitting. Second: (This is the easy part) Log on the board real late at night (somewhere between 2-4am) and go into your sub in the UD section, then hit Z for subop maintenance and once in there hit 2, once you are at this menu change the name of the UD section to: name/e (where the name is the name of the UD). Then leave the subop maintenance and leave the UD section, then go back into the UD section and you will see that your UD section is now a ENTIRE DISK EXCHANGE MODE which means you can kill/upload/download anything on the disk. Third: Now you must make for yourself backdoor, and then upload it to the board in place of the a prg. file already on the disk (making a backdoor for yourself will be discussed later) Fourth: Now just execute the prg. file you replaced with your backdoor and your set!! Method 2 -------- Now this method is simple and you dont need subop access BUT the sysop of the BBS you want to install this backdoor on has to be either: 1) a Lazy bum or 2) a completely stupid asshole This is how it works... First: You must go into the p-files section and see if there are any games in there, if not then funs over, this method wont work. Dont get your hopes up just because there are online games, now what you have to do is execute each one and make sure that each one is there and make sure you dont see: 'Error reading "name of game"', if you dont get any errors and all the games are there then your out of luck. Sorry, but the reason why it would say error reading the game is because that game isn't on the disk (or maybe it is just that the sysop misspelled the name , in any case...If there is an error than you now have the ability to install a backdoor. Second: This is easy from now on, now all you have to do is go into the UD section and upload a game with the name prg.name of game missing. Example: game missing is wrestling, so you upload a game called prg.wrestling. Get it? Well anyways this prg. that you upload must be you very own backdoor (this will be discussed later) Third: Just execute that game after you have uploaded it and you in control. Method 3 -------- This is probably the most worthless method and the hardest to do, but what the hell. In this method you must: First: Get ahold of an online game that the sysop does not have and is somewhat a good game, then install a backdoor (discussed later) and then upload it to the UD section, if the sysop is an idiot he will add it to the p-files section without even checking it, if he is smart he will check it for backdoors and if he is a complete idiot or you are good at hiding back doors than he'll add it to the p-files section. Second: Once it's in the p-files section just execute it and go with your backdoor. That simple! Method 4 -------- Do the same as method 3 BUT do not install a backdoor in the game, and wait till he puts it in the p-files section, once he does go into the UD section you uploded it to and check if its still there, if so then since you uploaded it, just kill it and then upload your backdoor, then execute the game and Ta Da! Making A Backdoor For Yourself ------------------------------ NOTE: It always helps to have a commie at hand when editing or making games or backdoors for CNET but I'm sure any computer will do. Here I will discuss some of the variables needed and some sub-routuines need to make a backdoor or game. Well first of all to start out all CNET games MUST be between the lines of 512-580, and you can not skip lines. --------------------- Important Variables: --------------------- a$ - used to print out things on the BBS, goes with a gosub 40, for example if you wanted to print out 'axeman is an asshole' you could do that by doing: a$="axeman is an asshole":gosub40 ac% - this is your access level, the access levels of cnet go from 0-9 (9 being sysop, and 0 being new user) I will discuss access levels in detail in a later file. NOTE: one easy way to make a backdoor would be to but somewhere in the game a line like this: ac%=9, that would give you sysop access an$ - the response of an input, (in other words what the luser typed in) b$ - current board # your in. cm$ - prompt (example=MAIN:) id - your id d1$ - last call date d2$ - current time and date pw$ - your password ------------------------ Important Sub-Routines: ------------------------ gosub 2100 - like input.(an$=the inputs response) gosub 40 - to print something out to the modem,(Example: a$="hello":gosub40 will print out 'hello') goto 6000 - logoff the user goto 1300 - the main menu goto 512 - execute a p-file(game) goto 16000 - read a file gosub61000 - do this 1st before going to 512 for loading in a game example: to load 'dumb game' do this: a$="dumb game":goto61000:goto512 Well those are some of the real neccesities. NOTE: When printing something out to the modem a ctrl-k will act as a carriage return. Example: a$="<ctrl-k>hello<ctrl-k>":gosub40 that will print a return then hello and then another return. Backdoor Example: ----------------- Here is a very simple example of a backdoor file for cnet, if you want you can use this, or your very own backdoor. Here goes: 512 a$=" a stupid backdoor ":gosub40 513 ac%=9:goto1300 As you probably know the example i've given will print out' a stupid backdoor ' and will then give you sysop access, and then return you to the main menu. The above is ofcourse a lame example, I dont have time for a complicated one. But I think you got the idea...If not then leave me mail on any board I'm on. Also try contacting your local commie user, he might be able to supply you with some nice ones, If you need one real bad, let me know and I'll make a few for you. C-Net Trick ----------- This isn't much but it is a simple way to find out who posted a anonymous msg on a CNET, this only works with the main message not the responses. What you do is read the message and then privately reply to the idiot who posted the message(Ooops I forgot to tell ya that you have to have a good idea of who the hell posted it...) then once you have done that go into the e-mail section by hitting M at the main menu and then type V to verify someones mail then all you do is enter that persons name and if it says that guy has a msg from you that you know it's him... Not so great a trick eh? ============================================================================== ----------------- / / BY / HAVE SOME / / / THE / FUN WITH / / / FASCIST / CALDOR PHONES! / / / PLATE ----------------- So, you are walking through your local Caldor, you see a phone sitting there, there are no clerks around, and nobody is watching you, it is now time to use the phone. Yes, you too can make calls to lots of different and strange places in your Caldor! In this first issue of Caldor Phone Numbers, I will give you some neat numbers to mess around with. To use these numbers, pick up the phone, dial a 7, then wait for a louder dial tone, then you can put in the number of your choice. Here are the numbers you could use: SPECIAL NUMBERS ------- ------- Accounts Payable 6235 Accounts Payable Adjustments 6234 Admore Distribution 7186 Advertisement Department 6161 Cafeteria 6269 Charge Sales 6219 Central Delivery 6129 Check Authorization 6401 Check Control 6211 Co-op Advertisement 6253 Computer Room 6025 Conference Room I 6244 Conference Room II 6356 Conference Room III 6388 Conference Room IV 6337 Construction Department 6266 Consumer Affairs 6004 Controller 6008 Data Processing 6365 Distribution Center 3020 Duplicating 6158 Executive Benefits 6003 Expense Department 6215 Gym 6196 Help Desk 6667 Internal Audit 6083 Inventory Control 6222 Legal Department 6242 Leisure Line Toys 7300 Mailroom 6159 Maintenance Department 6678 Operations Supervisor 6230 Payroll 6251 Personnel 6174 Personnel Benefits 6317 Printshop 6272 Purchasing 6203 Ralar Distribution 7195 Real Estate 6242 REceptionist 6240 Sales Audit 6217 Security Department 6256 Security REgionals 6256 Telelcommunications 6339 Traffic Accounts Payable 6663 Traffic Hauling 6315 TWX Message Center 6152 Those are all the numbers for this first file on Caldor Phone System. One last thing you might want to do is to dial 0, then ask the operator to page customer assistance to hardware or some other department, it might be interesting...remember, these numbers are for informational purposes only, I do not approve of you using them. Be sure to look for the next file on Caldor Phone Systems! TFP Some neat telephone numbers to call on a boring day. ------------------------------------------------------------------------------- NATIONAL STATES' RIGHTS PARTY 404-427-0283 NAZIS IN ARLINGTON 703-524-2175 NAZIS IN CHICAGO 312-863-8700 NAZIS IN CLEVELAND 216-631-6448 LIBERTY LOBBY 703-546-5611 NATIONAL ALLIANCE 703-525-3223 KU KLUX KLAN CHAPTERS: DAVID DUKE 404-835-7959 HAROLD COVINGTON 919-834-0063 BILL WILKINSON 504-665-1018 FRED WILKINS 303-232-8114 FALLBROOK, CALIFORNIA 714-728-0280 SAN DIEGO, CALIFORNIA 714-563-4555 ANAHEIM, CALIFORNIA 714-750-7848 LAKEWOOD, COLORADO 303-232-8373 OTHER REACTIONARY LOWLIFES: PHYLISS SCHLAFFLY 618-462-5415 G. GORDON LIDDY 301-567-3607 DAVID ATLEE PHILIPS 301-365-2238 PETER BOURNE 202-462-7266 WILLIAM COLBY 301-320-4646 RICHARD HELMS 202-686-1560 BERNARD BARKER 305-266-2220 L. PATRICK GRAY 203-535-1685 I am not too sure if these numbers are all still correct, these people might have moved since these were compiled. It is a little bit old. Oh well, have fun with them anyways...and remember...phone harassment is against the law! One little address you might want to write to... THE CROSS & THE FLAG P.O. BOX 27895 L.A., CALIFORNIA 90027 Remember, this stuff is just informational, and the author of this file can not take responsibility for what the readers do with this information! This information was taken from the book GETTING EVEN 2. ------------------------------------------------------------------------------- "Commies" -- To the tune of "Fight For Your Right" by the Beastie Boys. Yeah! Boot it! Turn your commie on, and it don't wanna go... Ask your mom for an ST, but she still says no... You blow three power packs, and it still won't work... So you boot up Zaxxon like some kinda jerk... You gotta fight, to get it right, on commies-----! You saw your drive smokin' and you said no way... Some dude crashed your board and it's been spinnin' all day... Those 1541's are such a drag... It just set fire to your best Commodore mag... You gotta fight, to get it right, on commies-----! <guitar solo here> You're not leavin' this board unless you u/l k00l warez... I'll trace this call and I bet you'll be scared... You're mom bust's in and says what that smell? Mommie don't worry my system's shot to hell... You gotta fight, to get it right, on commies-----! On commies--------! On commies--------! On commies--------! Yeah! This file brought to you by the Beastly Boyz....... Bellcon & The Surge 5/87 Well, that was the first issue of the Mishandled Information Publication! If you would like to talk with any of the writers of this magazine, please call these fine BBS's: TSD 24 HOURS 518/377-6487 ANARCHIA 24 HOURS 518/869-6035 If you would like to submit an article for upcoming issues of MIP, please contact me on TSD or Anarchia, I am on them as The Fascist Plate. I hope you have enjoyed reading the Mishandled Information Publication, if you have any comments or questions, contact me on the boards listed above. The Fascist Plate